By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this
job isn't what you are looking for, click the frowny face. Learn More...

Job Description

Prestigious Enterprise Company is currently seeking a Sr. Cyber Security Threat Analyst with strong Incident Response, SIEM, Vulnerabilities, and Threat experience. Candidate will have strong experience with incident response, threat analysis, forensic analysis and use of advanced threat detection technologies. Maintains relationships with internal and external customers, and vendors to formulate solutions for Company and customer system issues related to Information Security. Clearly understands business unit/department/company goals and demonstrates ability to translate them into specific performance goals.

Responsibilities:

* Strong experience working in a Security Operations environment* Responsible for executing processes within all activities within the security Cyber Threat and Incident Response life cycle. These activities include: detection, triage, analysis, containment, recovery and reporting.* Coordinates response, triage and recovery activities for security events affecting the company's information assets.*Leads efforts in the improvement and development of process/procedure manuals and documentation for incident response, threat intelligence, advanced persistent threat detection and vulnerability analysis.* Develop communication channels with technology owners and the business to evangelize the evolving threat landscape.* Must be able to present to different audiences and adjust accordingly (business, technical and management) either structured presentations or ad-hoc. Must be able to establish and maintain business relationships with individual contributors as well as management.

* Experience in the following: Unix Scripting, Programming, SQL, WAF, Reverse Engineering Malware, Vulnerability Analysis/Assessment* Bachelor's degree in Computer Science, Information Technology or Business Management* Proven ability to lead and influence across and up during business impacting events* Ability to influence and guide decision making in crisis moments* CISSP or security-related certification is preferred. Other relevant security certifications will be considered such as CEH, GCIH and GIAC.

Qualifications

This company profile was created by AfterCollege and is about Request Technology - Craig Johnson. This page is not endorsed by or affiliated with Request Technology - Craig Johnson. For
questions regarding company profiles, please email: care@aftercollege.com.